[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Call for Papers, 2014 Symposium on Cryptography and Authentication (SCA2014) , Suzhou, China



<span id="unSub" style="FONT-SIZE: 10pt; FONT-FAMILY: 
verdana,arial,helvetica,sans-serif; line-height:20px;">This message was sent to 
[bugtraq@xxxxxxxxxxxxxxxxx]. <a 
href="http://www.member.scirp.org/member/transferParameterAction.action?personID=7835691&identifier=5DFD5F85E4BE67FA9AE938BDE3C7410710FCD66EAA0F449D8C622F82188A7DE0&blackListTypeId=3";
 target="_blank">Unsubscribe</a></span><br/><span id="showTem" 
style="FONT-SIZE: 10pt; FONT-FAMILY: verdana,arial,helvetica,sans-serif; 
line-height:20px;"> If you cannot read it, please click  <a 
href="http://edm.scirp.org/template/showTemplateInfo?showId=4794&personName="; 
target="_blank">here</a>.</span><html>
 <head></head>
 <body>
  <table style="border-bottom:#5f712d 1px solid;border-left:#5f712d 1px 
solid;border-top:#5f712d 1px solid;border-right:#5f712d 1px solid;" 
class="ke-zeroborder" border="0" cellspacing="0" cellpadding="0" width="600"> 
   <tbody> 
    <tr> 
     <td 
style="padding-bottom:0px;padding-left:18px;padding-right:18px;padding-top:9px;">
      <table class="ke-zeroborder" border="0" cellspacing="0" cellpadding="0" 
width="100%"> 
       <tbody> 
        <tr> 
         <td style="font-family:Arial, Helvetica, 
sans-serif;color:#ff9966;font-size:24px;" align="center"><strong>Call for 
Papers </strong></td> 
        </tr> 
        <tr> 
         <td style="font-family:Arial, Helvetica, 
sans-serif;color:#ff9966;font-size:24px;" align="center"><strong>2014 Symposium 
on Cryptography and Authentication (SCA2014) </strong></td> 
        </tr> 
        <tr> 
         <td style="font-family:Arial, Helvetica, 
sans-serif;color:#ff9966;font-size:13pt;" align="right"> <p 
align="center">Submission Due: Nov. 27, 2013 &nbsp;&nbsp; Conference: March 
10-12, 2014</p></td> 
        </tr> 
       </tbody> 
      </table></td> 
    </tr> 
    <tr> 
     <td 
style="padding-bottom:9px;padding-left:18px;padding-right:18px;padding-top:9px;">
      <table class="ke-zeroborder" border="0" cellspacing="0" cellpadding="0" 
width="100%"> 
       <tbody> 
        <tr> 
         <td style="font-family:Arial, Helvetica, 
sans-serif;color:#ffffff;font-size:17px;" bgcolor="#ff9966" 
height="24"><strong>Dear Colleagues,</strong> </td> 
        </tr> 
        <tr> 
         <td 
style="padding-bottom:9px;line-height:1.4;padding-left:0px;padding-right:0px;font-family:Arial,
 Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:9px;"> We would 
like to cordially invite you to submit or recommend papers to 2014 Symposium on 
Cryptography and Authentication (SCA2014)! This conference will be held from 
March 10 to 12, 2014 in Suzhou, China. The conference will bring together 
leading researchers, engineers and scientists in the domain of interest from 
around the world. More detailed information can be found at <a target="_blank" 
href="http://www.engii.org/workshop/CIS2014March/Home.aspx?utm_campaign=sca&amp;utm_source=e_cp&amp;utm_medium=e_cp_conf_ws_sca_20131023";>www.engii.org/workshop/CIS2014March</a>.
 </td> 
        </tr> 
       </tbody> 
      </table></td> 
    </tr> 
    <tr> 
     <td 
style="padding-bottom:9px;padding-left:18px;padding-right:18px;padding-top:9px;">
      <table class="ke-zeroborder" border="0" cellspacing="0" cellpadding="0" 
width="100%"> 
       <tbody> 
        <tr> 
         <td style="font-family:Arial, Helvetica, 
sans-serif;color:#ffffff;font-size:17px;" bgcolor="#ff9966" height="24" 
colspan="2"><strong>Related Topics (more can be found in our website) 
</strong></td> 
        </tr> 
        <tr> 
         <td 
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial, 
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" 
class="td2"> • Anti-Virus and Anti-Worms</td> 
         <td 
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial, 
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" 
class="td2"> • Key Management and Key Recovery</td> 
        </tr> 
        <tr> 
         <td 
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial, 
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" 
class="td2"> • Database Security</td> 
         <td 
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial, 
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" 
class="td2"> • Language-based Security</td> 
        </tr> 
        <tr> 
         <td 
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial, 
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" 
class="td2"> • Distributed Systems Security</td> 
         <td 
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial, 
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" 
class="td2"> • Security Evaluation</td> 
        </tr> 
        <tr> 
         <td 
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial, 
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" 
class="td2"> • Electronic Commerce Security</td> 
         <td 
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial, 
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" 
class="td2"> • Security for Mobile Computing</td> 
        </tr> 
        <tr> 
         <td 
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial, 
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" 
class="td2"> • Fraud Control</td> 
         <td 
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial, 
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" 
class="td2"> • Security Models</td> 
        </tr> 
        <tr> 
         <td 
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial, 
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" 
class="td2"> • Information Security Engineering</td> 
         <td 
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial, 
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" 
class="td2"> • System Security</td> 
        </tr> 
        <tr> 
         <td 
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial, 
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" 
class="td2"> • Information Privacy</td> 
         <td 
style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Arial, 
Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" 
class="td2"> • Signature and Key Agreement Protocol</td> 
        </tr> 
       </tbody> 
      </table></td> 
    </tr> 
    <tr> 
     <td 
style="padding-bottom:0px;padding-left:18px;padding-right:18px;padding-top:9px;">
      <table class="ke-zeroborder" border="0" cellspacing="0" cellpadding="0" 
width="100%"> 
       <tbody> 
        <tr> 
         <td style="font-family:Arial, Helvetica, 
sans-serif;color:#ffffff;font-size:17px;" bgcolor="#ff9966" 
height="24"><strong>Technical Program Committee </strong></td> 
        </tr> 
        <tr> 
         <td 
style="padding-bottom:9px;line-height:1.4;padding-left:0px;padding-right:0px;font-family:Arial,
 Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:9px;"><p> 
<b>Prof. Fagen Li</b>, University of Electronic Science and Technology of 
China<br /> <b>Prof. Xiaochun Cheng</b>, Middlesex University<br /> <b>Prof. 
Vic Grout</b>, Glyndwr University<br /> <b>Prof. Giannis F. Marias</b>, Athens 
University of Economics and Business<br /> <b>Prof. Stavros D. 
Nikolopoulos</b>, University of Ioannina<br /> <a target="_blank" 
href="http://www.engii.org/workshop/CIS2014March/OrganizingCommittee.aspx?utm_campaign=sca&amp;utm_source=e_cp&amp;utm_medium=e_cp_conf_ws_sca_20131023";>
 &gt;&gt;More </a></p></td> 
        </tr> 
       </tbody> 
      </table></td> 
    </tr> 
    <tr> 
     <td 
style="padding-bottom:9px;padding-left:18px;padding-right:18px;padding-top:9px;">
      <table class="ke-zeroborder" border="0" cellspacing="0" cellpadding="0" 
width="100%"> 
       <tbody> 
        <tr> 
         <td style="font-family:Arial, Helvetica, 
sans-serif;color:#ffffff;font-size:17px;" bgcolor="#ff9966" 
height="24"><strong>Publication and Presentation</strong></td> 
        </tr> 
        <tr> 
         <td 
style="padding-bottom:9px;line-height:1.4;padding-left:0px;padding-right:0px;font-family:Arial,
 Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:9px;"> All the 
accepted papers will be published by &quot;Journal of Computer and 
Communications&quot; (ISSN:2327-5219), a peer-reviewed open access journal that 
can ensure the widest dissemination of your published work.<br /><br /> If you 
want to present your research results but do NOT wish to publish a paper, you 
may simply submit an Abstract to our <a target="_blank" 
href="http://www.engii.org/Workshop2014/MarchSubmission/index.aspx?utm_campaign=sca&amp;utm_source=e_cp&amp;utm_medium=e_cp_conf_ws_sca_20131023";>Registration
 System</a>. </td> 
        </tr> 
       </tbody> 
      </table></td> 
    </tr> 
    <tr> 
     <td 
style="padding-bottom:5px;padding-left:18px;padding-right:18px;padding-top:0px;">
      <table width="100%"> 
       <tbody> 
        <tr> 
         <td style="border-bottom:#666666 2px 
solid;padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:Trebuchet
 
MS,Arial,'TradeGothic-CondEighteen',Arial,Helvetica,sans-serif;color:#333333;font-size:13pt;font-weight:bold;padding-top:4px;"
 class="td">Yours sincerely,</td> 
        </tr> 
        <tr> 
         <td 
style="padding-bottom:0px;padding-left:0px;padding-right:0px;font-family:'TradeGothic-CondEighteen',Arial,Helvetica,sans-serif;color:#333333;font-size:17px;padding-top:0px;"
 class="td2"> SCA Organizing Committee<br /> Email: CIS@xxxxxxxxx<br /> Tel : 
+86- 132 6470 2230</td> 
        </tr> 
       </tbody> 
      </table></td> 
    </tr> 
   </tbody> 
  </table> 
 </body>
</html><img id="openURL" 
src="http://www.member.scirp.org/emailopen/doSaveLogAction.action?email=bugtraq@xxxxxxxxxxxxxxxxx&personId=7835691&taskId=3426";
 style="display:none;width:1px;height:1px;">